• On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation 

      Gellert, Kai; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor (Journal article; Peer reviewed, 2023)
      A standard paradigm for building key exchange protocols with full forward secrecy (and explicit authentication) is to add key confirmation messages to an underlying protocol having only weak forward secrecy (and implicit ...
    • Paper-based electronic voting 

      Testaniere, Anna Solveig Julia (Master thesis, 2015)
      In this thesis, we present two paper-based electronic voting systems Prêt-à-Voter and Demos. We describe these in the same systematic way with new examples. Furthermore, we implement RSA cryptosystem in Prêt-à-Voter. Then, ...
    • Paper-based electronic voting 

      Vederhus, Anna (Master thesis, 2015)
      In this thesis, we present two paper-based electronic voting systems Prêt-à-Voter and Demos. We describe these in the same systematic way with new examples. Furthermore, we implement RSA cryptosystem in Prêt-à-Voter. Then, ...
    • Picnic with Friends: Constructing post quantum digital signature schemes 

      Millerjord, Lise (Master thesis, 2021)
      Det digitale signatursystemet, Picnic [5], er et post-kvantesystem som ble introdusert som en del av NIST-prosessen for å standardisere post-kvantekryptografi [15]. Vi ser på hvordan Picnic er konstruert, og sikkerhetsegenskapene ...
    • Point Multiplication 

      Nuri, Haidar (Master thesis, 2012)
      We have looked at some theory behind the Weierstrass curve, Hessian curve and Edwards curve. Also the cost of the Weierstrass curve and the Edwards curve have been measured for different wNAF representations.
    • Post-quantum cryptography 

      Hageli, Sander Støle (Bachelor thesis, 2021)
      I denne bacheloroppgaven, ser vi på CRYSTALS Kyber, en CCA2 kvante-resistante Key Encapsulation Mechanism, hvordan den er konstruert og dens sikkerhet. Vi kommer også til å se på Module Learning With Error Problemet. Det ...
    • Practical and tightly-secure digital signatures and authenticated key exchange 

      Gjøsteen, Kristian; Jager, Tibor (Journal article; Peer reviewed, 2018)
      Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose cryptographic parameters in a way that is supported by a security proof, without the need to sacrifice efficiency by ...
    • Practical Isogeny-Based Key-Exchange with Optimal Tightness 

      de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia (Journal article; Peer reviewed, 2021)
      We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when ...
    • Privacy Preserving Computation with Fully Homomorphic Encryption 

      Sjødin, Jacob (Master thesis, 2021)
      Målet med denne oppgaven er å vise hvordan personvernbevarende beregninger kan oppnås gjennom homomorf kryptering. Oppgaven utforsker BGV-kryptosystemet og hvordan det kan brukes til å beregne vilkårlige polynomer på data. ...
    • Privacy Preserving Encryption and Machine Learning 

      Bredland, Ulrik (Master thesis, 2023)
      Målet med denne oppgaven er å undersøke hvordan vi kan bruke homomorf kryptering med maskinlæring. Vi utforsker det homomorfe krypteringssystemet CKKS som fungerer for aritmetikk med omtrentlige tall. Deretter diskuterer ...
    • Privacy-Preserving Cryptography from Zero-Knowledge Proofs 

      Silde, Tjerand Aga (Doctoral theses at NTNU;2022:235, Doctoral thesis, 2022)
    • Refining the Internet Voting Protocol 

      Lund, Anders Smedstuen (Master thesis, 2011)
      We make two improvements to the Internet voting protocol written by Gjøsteen. The first improvement improves the performance of the protocol, by changing the encryption of the votes. The second improvement improves the ...
    • Return Codes from Lattice Assumptions 

      Høgåsen, Audhild (Master thesis, 2022)
      Vi presenterer en fremgangsmåte for å lage returkoder for et gitter-basert elektronisk valgsystem. For et valgsystem med fire kontrollkomponenter og kommunikasjon i to runder oppnår protokollen vår en total kommunikasjonsstørrelse ...
    • Revisiting Practical and Usable Coercion-Resistant Remote E-Voting 

      Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Ryan, Peter Y. A. (Peer reviewed; Journal article, 2020)
      In this paper we revisit the seminal coercion-resistant e-voting protocol by Juels, Catalano and Jakobsson (JCJ) and in particular the attempts to make it usable and practical. In JCJ the user needs to handle cryptographic ...
    • Secure and Verifiable Electronic Elections at NTNU 

      Onshus, Bent Kristoffer Rosvold (Master thesis, 2006)
      This thesis describes an electronic voting system based on Damg\aa rd, Jurik and Nielsen's generalization of Paillier's probabilistic public key system. A threshold variant of this homomorphic cryptosystem is used to provide ...
    • Secure and Verifiable Electronic Elections at NTNU 

      Onshus, Bent Kristoffer Rosvold (Master thesis, 2006)
      This thesis describes an electronic voting system based on Damgaa rd, Jurik and Nielsen's generalization of Paillier's probabilistic public key system. A threshold variant of this homomorphic cryptosystem is used to provide ...
    • Secure Messaging with Crypho 

      Fredheim, Malene Kulild (Master thesis, 2020)
      I denne oppgaven gir vi et overblikk over meldingsapplikasjonene, Crypho og Signal, som bruker ende-til-ende-kryptering med symmetrisk kryptering. Vi bruker en spill-basert metode til å undersøke sikkerheten til kanaler ...
    • Security Analysis of Electronic Identity Schemes 

      Amdam, Eli Sofie Finnøy (Master thesis, 2009)
      This report is about electronic identity (eID) schemes and a security analysis in the Universal Composable (UC) security framework of Transport Layer Security (TLS) and OpenID. The security analysis show that secure ...
    • Security for Electronic Voting Systems 

      Solberg, Morten Rotvold (Doctoral theses at NTNU;2023:381, Doctoral thesis, 2023)
    • Security notions for cloud storage and deduplication 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen (Journal article; Peer reviewed, 2018)
      Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required ...